Title: Embedded Extended Visual Cryptography Schemes
1Embedded Extended Visual Cryptography Schemes
- By
- SHAIK TABREZ(09J01A1225)
- ISMAIL IMANI(09J01A1232)
- MOHD AHMED(O9J01A1221)
2INTRODUCTION
- THE basic principle of the visual cryptography
scheme (VCS) was first introduced by Naor and
Shamir. VCS is a kind of secret sharing scheme
that focuses on sharing secret images.
3The idea of the visual cryptography model
proposed in is to split a secret image into two
random shares (printed on transparencies) which
separately reveals no information about the
secret image other than the size of the secret
image.
4The size of all the images is 768768
The size of all the images is 768 768.
5BRIEF OVERVIEW OF DOMAIN
- The quality or state of being secure to be free
from danger
- Security is achieved using several strategies63
- Security is achieved using several strategies
simultaneously or used in combination with one
another
6- Security is recognized as essential to protect
vital processes and the systems that provide
those processes - Security is not something you buy, it is
something you do
7PREVIOUS WORK
- Visual cryptography is the art and science of
encrypting the image in such a way that no-one
apart from the sender and intended recipient even
realizes the original image, a form of security
through obscurity. By contrast, cryptography
obscures the original image, but it does not
conceal the fact that it is not the actual image.
8LIMITATIONS
- The existing system does not provide a friendly
environment to encrypt or decrypt the data
(images).
9- PROPOSED SYSTEM
- Visual cryptography provides a friendly
environment to deal with images. Generally
cryptography tools supports only one kind of
image formats. Our application supports .gif and
.png (portable network graphics) formatted images
and our application has been developed using
swing and applet technologies, hence provides a
friendly environment to users.
10 ADVANTAGES OF PROPOSED SYSTEM
- EVCS is flexible in the sense that there exist
two trade-offs between the share pixel expansion
and the visual quality of the shares and between
the secret image pixel expansion and the visual
quality of the shares. - This flexibility allows the dealer to choose the
proper parameters for different applications.
11MODULE S
- This application consist FOUR modules
- VISUAL CRYPTOGRAPHY IMPLEMENTATION
- ENCODING
- DECODING
- TESTING AND INTEGRATION
-
121. VISUAL CRYPTOGRAPHY IMPLEMENTATION
- This module is the core for the project, where we
implement the Visual Cryptography. We used LZW
Data Compression algorithm. The LZW data
compression algorithm is applied for the gray
scale image here.
132.ENCODING
- The algorithm works by scanning through the input
string for successively longer substrings until
it finds one that is not in the dictionary
143.DECODING
- The decoding algorithm works by reading a value
from the encoded input and outputting the
corresponding string from the initialized
dictionary - the final input value is decoded without any more
additions to the dictionary
154.TESTING AND INTEGRATION
-
- This is the final module, which consists of
integration of Visual cryptography implementation
module into interface design using applet viewer.
16SYSTEM ARCHITECTURE
SELECT IMAGE
SELECT NON TRANSPRANCIE
ENCRYPT
SAVE TRANSPRANCIES
RECIEVER
17HARDWARE AND SOFTWARE REQUIREMENTS
- HARDWARE REQUIREMENTS
- System Pentium IV 2.4 GHz.
- Hard Disk 40 GB.
- Floppy Drive 1.44 Mb
- Ram 512 Mb.
18SOFTWARE REQUIREMENTS
- Operating system Windows XP
- Coding Language JDK 1.6
- Tools Netbeans
19CONCLUSION
- we proposed a construction of EVCS which was
realized by embedding the random shares into the
meaningful covering shares. - The shares of the proposed scheme are meaningful
images, and the stacking of a qualified subset of
shares will recover the secret image visually. - the visual quality of the shares and between the
secret image pixel expansion and the visual
quality of the shares.
20(No Transcript)
21